SlideShare une entreprise Scribd logo
1  sur  19
System Security

By
Mr. Amin Pathan

(M.Tech-CSE Pursuing, BE-IT)

Lecturer, MGM`s Polytechnic, Aurangabad.
Password Management

Password Security
The important protection against Intruders is the password system.
The password serves in used to authenticate the ID of the individual who logs on
to the system.
ID determines whether the user is authorized or unauthorized to gain access to a system.
ID determines the privileges according to the user.
ID is used as unrestricted access control.











Example

UNIX Operating System
User selects a password of up to eight printable characters in length.
This password is then converted into a 56 bit value that serves as the key input to an
encryption process based on DES.
DES Algorithm is modified using a 12 bit salt value.
This way, it prevents duplicate password.









Password Selection Strategies (Policies)

1. User Education



2. Computer Generated Password



3. Reactive password checking



4. Proactive password checking


1. User Education

Tell the importance of hard-to-guess password to the users & provide guidelines for
selecting strong password.
This strategy is unlikely to be successful at most installation, particularly where there is
a large user population.
Many users will simply ignore the guidelines, which may not be good judgement of what
is a strong password.






2. Computer Generated Password

Users will not be able to remember the computer generated password, even though the
password is pronounceable.
The passwords are reasonably random in nature.
So many times users write it down.






3. Reactive password Checking

The system periodically runs its own password cracker program to find out guessable
passwords.
If the system find any such a password then cancels it & notifies the user




4. Proactive password checking

User is allowed to select his/her own password.
At the time of selection, the system checks the password if the password is allowable
then allow otherwise reject it.




Components of Good password

As a password is meant to protect access and resources from intruders, it should not be
easy for some one else to guess.
Followings are the some guidelines to make a password more difficult to guess or obtain.
1. Password should be at least eight characters long
2. It should have at least three elements among following elements
(one or more uppercase, one or more lowercase, one or more numerals, one or
more special characters).
3. It should not consist of dictionary words.
4. It should not at all be the same as the users login name












Operating System Hardening

OS is the system software which handles input, output, display, memory management &
all highly tasks.
OS Example :Microsoft (95, 98, NT, 2000, ME, XP, Vista, 7, 8)
Apple Mac OS, Sun Solaris, UNIX
NOS includes additional functions and capabilities to help in connecting computers &
devices like printers to LAN
Example :- Windows Server 2003, Windows Server 2008.
OS Manufactures will not provide security but some recommendations or simplified
tools & settings to facilitate security of the system.














Operating System Hardening cont...

Removing unnecessary applications and utilities, disabling unnecessary services, setting
of appropriate permissions on files and updating the OS and application code to the
latest version.
This process of securing an OS is known as OS hardening and it is intended to make
the system more secure.




Step for securing Windows OS

1. Disable all unnecessary Service
2. Restrict permissions on files and access to the Registry
3. Remove unnecessary Programs.
4. Apply the latest patches and fix
5. Remove unnecessary user accounts and ensure password guidelines are in place










Weaknesses of Windows OS

MS Windows is not open source
Windows OS installation is insecure because it includes hidden shares, blank passwords
& it will not provide protection for known vulnerabilities.
It is difficult for administrator to understand how to properly use & configure the
software on various hardware setups.
It slows down after running 24 hours.
Many users don`t understand the security risk related to system while configuring it,
so this will cause for different attacks.
Less actual control over files.














UNIX OS Hardening

The process of securing UNIX OS to make the system more secure is called as
UNIX OS Hardening.
It means it disable unnecessary services, restrict permissions on files and directories,
apply password guidelines, remove unnecessary software, apply patches, and remove
unnecessary users.
UNIX system is very powerful and flexible.
This is all depending on the skill and knowledge of the system administrator because
so much control is placed in the administrators hand.
UNIX systems are easier to secure and baseline when they are providing a single
service or performing a single function, like acting as SMTP or web Server.












UNIX OS Hardening

Cont...

During installation process, it is easy to select which services and applications are
placed on the system.
On UNIX System by using the process status or by ps command, you can see which
processes, applications and services are running.
An administrator can identify the service by its unique process identifier or PID.
To stop a running service the process is identified by PID and then kill command id
used to stop the services.






Updates

To the standard user or system administrator is constant stream of updates designed to
correct problems, replace sections of code, or even add new features to an installed OS.
Vendors typically follows a hierarchy for software updates given below:1. Hotfix
2. Patch
3. Service Pack










Updates

Cont...

1. Hotfix
This term is given to small software update designed to address particular problem.
Hotfixes are typically developed in reaction to a discovered problem.
2. Patch
This term is given to large software updates designed to address particular problem.
Patches contain improvements or additional capabilities ans fixes for known bugs.
They are usually developed over a longer period of time.












Updates

Cont..

3. Service Pack
This term is given to a large collection of patches and hotfixes that are rolled into a single.
Service packs are designed to bring a system up to the latest known rather than
requiring the user or system administrator to download several of updates separately.






Thanks...!



Contenu connexe

Tendances

Operating system security
Operating system securityOperating system security
Operating system security
Sarmad Makhdoom
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System Threats
Reddhi Basu
 
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
blusmurfydot1
 

Tendances (18)

Operating system security
Operating system securityOperating system security
Operating system security
 
Program Threats
Program ThreatsProgram Threats
Program Threats
 
Windows Security in Operating System
Windows Security in Operating SystemWindows Security in Operating System
Windows Security in Operating System
 
OS Security 2009
OS Security 2009OS Security 2009
OS Security 2009
 
Ch11
Ch11Ch11
Ch11
 
Goals of protection
Goals of protectionGoals of protection
Goals of protection
 
system Security
system Security system Security
system Security
 
Secure System Password (SSP) Application for NT Editor Hacking Tool
Secure System Password (SSP) Application for NT Editor Hacking ToolSecure System Password (SSP) Application for NT Editor Hacking Tool
Secure System Password (SSP) Application for NT Editor Hacking Tool
 
Operating system security
Operating system securityOperating system security
Operating system security
 
COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMCOMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEM
 
File security system
File security systemFile security system
File security system
 
Security & Protection in Operating System
Security & Protection in Operating SystemSecurity & Protection in Operating System
Security & Protection in Operating System
 
Tips for Securing Your Workstation
Tips for Securing Your WorkstationTips for Securing Your Workstation
Tips for Securing Your Workstation
 
Operating System & Application Security
Operating System & Application SecurityOperating System & Application Security
Operating System & Application Security
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System Threats
 
Presentation
PresentationPresentation
Presentation
 
Hardening Database Server
Hardening Database ServerHardening Database Server
Hardening Database Server
 
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
 

En vedette

Charles Dickens
Charles DickensCharles Dickens
Charles Dickens
DavidwuTAS
 
9 password security
9   password security9   password security
9 password security
drewz lin
 

En vedette (11)

Cspass
CspassCspass
Cspass
 
Password Security
Password SecurityPassword Security
Password Security
 
Charles Dickens
Charles DickensCharles Dickens
Charles Dickens
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based Security
 
9 password security
9   password security9   password security
9 password security
 
Password Security
Password SecurityPassword Security
Password Security
 
Password Management
Password ManagementPassword Management
Password Management
 
Password based wireless door opener security system
Password based wireless door opener security systemPassword based wireless door opener security system
Password based wireless door opener security system
 
Primer on password security
Primer on password securityPrimer on password security
Primer on password security
 
Defense in Depth: Implementing a Layered Privileged Password Security Strategy
Defense in Depth: Implementing a Layered Privileged Password Security Strategy Defense in Depth: Implementing a Layered Privileged Password Security Strategy
Defense in Depth: Implementing a Layered Privileged Password Security Strategy
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
 

Similaire à System security by Amin Pathan

Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...
Jennifer Lopez
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討
Timothy Chen
 
Microsoft Operating System Vulnerabilities
Microsoft Operating System VulnerabilitiesMicrosoft Operating System Vulnerabilities
Microsoft Operating System Vulnerabilities
Information Technology
 
Threats To The System
Threats To The SystemThreats To The System
Threats To The System
Steven Cahill
 

Similaire à System security by Amin Pathan (20)

Ch10 system administration
Ch10 system administration Ch10 system administration
Ch10 system administration
 
Ch10
Ch10Ch10
Ch10
 
CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System)
 
Ch11 system administration
Ch11 system administration Ch11 system administration
Ch11 system administration
 
Module 4 qui parle de la sécurisation des applications
Module 4 qui parle de la sécurisation des applicationsModule 4 qui parle de la sécurisation des applications
Module 4 qui parle de la sécurisation des applications
 
Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
Operating Systems R20 Unit 1.pptx
Operating Systems R20 Unit 1.pptxOperating Systems R20 Unit 1.pptx
Operating Systems R20 Unit 1.pptx
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討
 
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
 
2600 v03 n02 (february 1986)
2600 v03 n02 (february 1986)2600 v03 n02 (february 1986)
2600 v03 n02 (february 1986)
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
 
Ch07 Access Control Fundamentals
Ch07 Access Control FundamentalsCh07 Access Control Fundamentals
Ch07 Access Control Fundamentals
 
Ch08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System VulnerabilitiesCh08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System Vulnerabilities
 
Microsoft Operating System Vulnerabilities
Microsoft Operating System VulnerabilitiesMicrosoft Operating System Vulnerabilities
Microsoft Operating System Vulnerabilities
 
Microsoft OS Vulnerabilities
Microsoft OS VulnerabilitiesMicrosoft OS Vulnerabilities
Microsoft OS Vulnerabilities
 
operating system Security presentation vol 3
operating system Security presentation vol 3operating system Security presentation vol 3
operating system Security presentation vol 3
 
Checking Windows for signs of compromise
Checking Windows for signs of compromiseChecking Windows for signs of compromise
Checking Windows for signs of compromise
 
Threats To The System
Threats To The SystemThreats To The System
Threats To The System
 
Top 10 ways to make hackers excited: All about the shortcuts not worth taking
Top 10 ways to make hackers excited: All about the shortcuts not worth takingTop 10 ways to make hackers excited: All about the shortcuts not worth taking
Top 10 ways to make hackers excited: All about the shortcuts not worth taking
 

Plus de aminpathan11 (15)

E wallet by amin
E wallet by aminE wallet by amin
E wallet by amin
 
4 g technology by amin
4 g technology by amin4 g technology by amin
4 g technology by amin
 
Cloud computing by amin
Cloud computing by aminCloud computing by amin
Cloud computing by amin
 
Hololens
HololensHololens
Hololens
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
 
Access control by amin
Access control by aminAccess control by amin
Access control by amin
 
Tracing an email by Amin Pathan
Tracing an email by Amin PathanTracing an email by Amin Pathan
Tracing an email by Amin Pathan
 
Human resource management by Amin
Human resource management by AminHuman resource management by Amin
Human resource management by Amin
 
VPN by Amin Pathan
VPN by Amin PathanVPN by Amin Pathan
VPN by Amin Pathan
 
ISDN
ISDNISDN
ISDN
 
IP Sec by Amin Pathan
IP Sec by Amin PathanIP Sec by Amin Pathan
IP Sec by Amin Pathan
 
Active directory and application
Active directory and applicationActive directory and application
Active directory and application
 
PSTN
PSTNPSTN
PSTN
 
Management
ManagementManagement
Management
 
Forms of ownerships in Management
Forms of ownerships in ManagementForms of ownerships in Management
Forms of ownerships in Management
 

Dernier

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Dernier (20)

9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 

System security by Amin Pathan

  • 1. System Security By Mr. Amin Pathan (M.Tech-CSE Pursuing, BE-IT) Lecturer, MGM`s Polytechnic, Aurangabad.
  • 2. Password Management Password Security The important protection against Intruders is the password system. The password serves in used to authenticate the ID of the individual who logs on to the system. ID determines whether the user is authorized or unauthorized to gain access to a system. ID determines the privileges according to the user. ID is used as unrestricted access control.      
  • 3. Example UNIX Operating System User selects a password of up to eight printable characters in length. This password is then converted into a 56 bit value that serves as the key input to an encryption process based on DES. DES Algorithm is modified using a 12 bit salt value. This way, it prevents duplicate password.     
  • 4. Password Selection Strategies (Policies) 1. User Education  2. Computer Generated Password  3. Reactive password checking  4. Proactive password checking 
  • 5. 1. User Education Tell the importance of hard-to-guess password to the users & provide guidelines for selecting strong password. This strategy is unlikely to be successful at most installation, particularly where there is a large user population. Many users will simply ignore the guidelines, which may not be good judgement of what is a strong password.   
  • 6. 2. Computer Generated Password Users will not be able to remember the computer generated password, even though the password is pronounceable. The passwords are reasonably random in nature. So many times users write it down.   
  • 7. 3. Reactive password Checking The system periodically runs its own password cracker program to find out guessable passwords. If the system find any such a password then cancels it & notifies the user  
  • 8. 4. Proactive password checking User is allowed to select his/her own password. At the time of selection, the system checks the password if the password is allowable then allow otherwise reject it.  
  • 9. Components of Good password As a password is meant to protect access and resources from intruders, it should not be easy for some one else to guess. Followings are the some guidelines to make a password more difficult to guess or obtain. 1. Password should be at least eight characters long 2. It should have at least three elements among following elements (one or more uppercase, one or more lowercase, one or more numerals, one or more special characters). 3. It should not consist of dictionary words. 4. It should not at all be the same as the users login name      
  • 10. Operating System Hardening OS is the system software which handles input, output, display, memory management & all highly tasks. OS Example :Microsoft (95, 98, NT, 2000, ME, XP, Vista, 7, 8) Apple Mac OS, Sun Solaris, UNIX NOS includes additional functions and capabilities to help in connecting computers & devices like printers to LAN Example :- Windows Server 2003, Windows Server 2008. OS Manufactures will not provide security but some recommendations or simplified tools & settings to facilitate security of the system.       
  • 11. Operating System Hardening cont... Removing unnecessary applications and utilities, disabling unnecessary services, setting of appropriate permissions on files and updating the OS and application code to the latest version. This process of securing an OS is known as OS hardening and it is intended to make the system more secure.  
  • 12. Step for securing Windows OS 1. Disable all unnecessary Service 2. Restrict permissions on files and access to the Registry 3. Remove unnecessary Programs. 4. Apply the latest patches and fix 5. Remove unnecessary user accounts and ensure password guidelines are in place     
  • 13. Weaknesses of Windows OS MS Windows is not open source Windows OS installation is insecure because it includes hidden shares, blank passwords & it will not provide protection for known vulnerabilities. It is difficult for administrator to understand how to properly use & configure the software on various hardware setups. It slows down after running 24 hours. Many users don`t understand the security risk related to system while configuring it, so this will cause for different attacks. Less actual control over files.       
  • 14. UNIX OS Hardening The process of securing UNIX OS to make the system more secure is called as UNIX OS Hardening. It means it disable unnecessary services, restrict permissions on files and directories, apply password guidelines, remove unnecessary software, apply patches, and remove unnecessary users. UNIX system is very powerful and flexible. This is all depending on the skill and knowledge of the system administrator because so much control is placed in the administrators hand. UNIX systems are easier to secure and baseline when they are providing a single service or performing a single function, like acting as SMTP or web Server.      
  • 15. UNIX OS Hardening Cont... During installation process, it is easy to select which services and applications are placed on the system. On UNIX System by using the process status or by ps command, you can see which processes, applications and services are running. An administrator can identify the service by its unique process identifier or PID. To stop a running service the process is identified by PID and then kill command id used to stop the services.   
  • 16. Updates To the standard user or system administrator is constant stream of updates designed to correct problems, replace sections of code, or even add new features to an installed OS. Vendors typically follows a hierarchy for software updates given below:1. Hotfix 2. Patch 3. Service Pack     
  • 17. Updates Cont... 1. Hotfix This term is given to small software update designed to address particular problem. Hotfixes are typically developed in reaction to a discovered problem. 2. Patch This term is given to large software updates designed to address particular problem. Patches contain improvements or additional capabilities ans fixes for known bugs. They are usually developed over a longer period of time.      
  • 18. Updates Cont.. 3. Service Pack This term is given to a large collection of patches and hotfixes that are rolled into a single. Service packs are designed to bring a system up to the latest known rather than requiring the user or system administrator to download several of updates separately.   